☆42Nov 15, 2025Updated 4 months ago
Alternatives and similar repositories for shadow-repeater
Users that are interested in shadow-repeater are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quickly find all identities someone has used on their Github commits☆15Jul 28, 2024Updated last year
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆26Jan 13, 2025Updated last year
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- 收集整理公开的子域名字典☆18Jun 3, 2024Updated last year
- An AI-powered assistant for hackers and security professionals built for Caido☆33Jan 24, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Feb 18, 2022Updated 4 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- ☆16Nov 28, 2025Updated 4 months ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆37Mar 4, 2025Updated last year
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Mar 27, 2024Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Aug 17, 2022Updated 3 years ago
- Bambdas collection for Burp Suite Professional and Community.☆512Mar 12, 2026Updated 3 weeks ago
- ☆15Aug 25, 2023Updated 2 years ago
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 4 years ago
- ☆41Sep 9, 2023Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- ☆36Jun 21, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆388Nov 26, 2024Updated last year
- ☆20Apr 10, 2025Updated 11 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- A small server to receive files over HTTP☆15Nov 30, 2023Updated 2 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool to download IP ranges of CDN providers for bug bounties☆14Jul 24, 2024Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Topic: The Swiss Army Knife of Java Exploitation☆21Feb 25, 2025Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆834Mar 24, 2026Updated 2 weeks ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 11 months ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆129Dec 29, 2024Updated last year